mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
75c2800702
commit
945bd1d05a
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020125 Identifying PGP Corporate Desktop 7.1 with PGPfire Personal Desktop Firewall installed (no need to be enabled) on Microsoft Windows Based OSs",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://online.securityfocus.com/archive/1/252407"
|
||||
},
|
||||
{
|
||||
"name": "3961",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/3961"
|
||||
},
|
||||
{
|
||||
"name": "20020125 Identifying PGP Corporate Desktop 7.1 with PGPfire Personal Desktop Firewall installed (no need to be enabled) on Microsoft Windows Based OSs",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://online.securityfocus.com/archive/1/252407"
|
||||
},
|
||||
{
|
||||
"name": "pgpfire-icmp-fingerprint(8008)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,90 +52,90 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020626 Revised OpenSSH Security Advisory (adv.iss)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=102514631524575&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20020626 OpenSSH Security Advisory (adv.iss)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=102514371522793&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20020627 How to reproduce OpenSSH Overflow.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=102521542826833&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "20020628 Sun statement on the OpenSSH Remote Challenge Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=102532054613894&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "VU#369347",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/369347"
|
||||
},
|
||||
{
|
||||
"name" : "CA-2002-18",
|
||||
"refsource" : "CERT",
|
||||
"url" : "http://www.cert.org/advisories/CA-2002-18.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-134",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2002/dsa-134"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBUX0206-195",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195"
|
||||
},
|
||||
{
|
||||
"name" : "5093",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5093"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2002:131",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "http://www.redhat.com/support/errata/RHSA-2002-131.html"
|
||||
},
|
||||
{
|
||||
"name" : "CSSA-2002-030.0",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt"
|
||||
},
|
||||
{
|
||||
"name" : "CLA-2002:502",
|
||||
"refsource" : "CONECTIVA",
|
||||
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502"
|
||||
},
|
||||
{
|
||||
"name" : "ESA-20020702-016",
|
||||
"refsource" : "ENGARDE",
|
||||
"url" : "http://www.linuxsecurity.com/advisories/other_advisory-2177.html"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2002:040",
|
||||
"refsource" : "MANDRAKE",
|
||||
"url" : "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040"
|
||||
},
|
||||
{
|
||||
"name" : "SuSE-SA:2002:024",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://www.novell.com/linux/security/advisories/2002_024_openssh_txt.html"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2002:127",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-127.html"
|
||||
},
|
||||
{
|
||||
"name": "20020626 OpenSSH Security Advisory (adv.iss)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=102514371522793&w=2"
|
||||
},
|
||||
{
|
||||
"name": "SuSE-SA:2002:024",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://www.novell.com/linux/security/advisories/2002_024_openssh_txt.html"
|
||||
},
|
||||
{
|
||||
"name": "20020628 Sun statement on the OpenSSH Remote Challenge Vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=102532054613894&w=2"
|
||||
},
|
||||
{
|
||||
"name": "839",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/839"
|
||||
},
|
||||
{
|
||||
"name": "CA-2002-18",
|
||||
"refsource": "CERT",
|
||||
"url": "http://www.cert.org/advisories/CA-2002-18.html"
|
||||
},
|
||||
{
|
||||
"name": "20020627 How to reproduce OpenSSH Overflow.",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=102521542826833&w=2"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2002:131",
|
||||
"refsource": "REDHAT",
|
||||
"url": "http://www.redhat.com/support/errata/RHSA-2002-131.html"
|
||||
},
|
||||
{
|
||||
"name": "5093",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5093"
|
||||
},
|
||||
{
|
||||
"name": "CSSA-2002-030.0",
|
||||
"refsource": "CALDERA",
|
||||
"url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-030.0.txt"
|
||||
},
|
||||
{
|
||||
"name": "ESA-20020702-016",
|
||||
"refsource": "ENGARDE",
|
||||
"url": "http://www.linuxsecurity.com/advisories/other_advisory-2177.html"
|
||||
},
|
||||
{
|
||||
"name": "VU#369347",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/369347"
|
||||
},
|
||||
{
|
||||
"name": "CLA-2002:502",
|
||||
"refsource": "CONECTIVA",
|
||||
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000502"
|
||||
},
|
||||
{
|
||||
"name": "HPSBUX0206-195",
|
||||
"refsource": "HP",
|
||||
"url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0206-195"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2002:040",
|
||||
"refsource": "MANDRAKE",
|
||||
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:040"
|
||||
},
|
||||
{
|
||||
"name": "20020626 Revised OpenSSH Security Advisory (adv.iss)",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=102514631524575&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020712 The answer to the PIX encryption issue",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=102651159507659&w=2"
|
||||
},
|
||||
{
|
||||
"name": "20020621 [VulnWatch] Weak Cisco Pix Password Encryption Algorithm",
|
||||
"refsource": "VULNWATCH",
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0121.html"
|
||||
},
|
||||
{
|
||||
"name": "20020712 The answer to the PIX encryption issue",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=102651159507659&w=2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "yabb-invalid-thread-xss(9408)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9408.php"
|
||||
},
|
||||
{
|
||||
"name": "20020621 [AP] YaBB Cross-Site Scripting vulnerability",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "5078",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5078"
|
||||
},
|
||||
{
|
||||
"name" : "yabb-invalid-thread-xss(9408)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/9408.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,24 +53,24 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20020923 iDEFENSE Security Advisory 09.23.2002: Directory Traversal in Dino's Webserver",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://marc.info/?l=bugtraq&m=103281444824285&w=2"
|
||||
"name": "5782",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/5782"
|
||||
},
|
||||
{
|
||||
"name": "20020923 iDEFENSE Security Advisory 09.23.2002: Directory Traversal in Dino's Webserver",
|
||||
"refsource": "VULNWATCH",
|
||||
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0127.html"
|
||||
},
|
||||
{
|
||||
"name": "20020923 iDEFENSE Security Advisory 09.23.2002: Directory Traversal in Dino's Webserver",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://marc.info/?l=bugtraq&m=103281444824285&w=2"
|
||||
},
|
||||
{
|
||||
"name": "dinos-dotdot-directory-traversal(10168)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10168.php"
|
||||
},
|
||||
{
|
||||
"name" : "5782",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/5782"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "tftp-udp-datagram-bo(10462)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/10462.php"
|
||||
},
|
||||
{
|
||||
"name": "20021024 TFTP Server DoS",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -66,11 +71,6 @@
|
||||
"name": "6043",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/6043"
|
||||
},
|
||||
{
|
||||
"name" : "tftp-udp-datagram-bo(10462)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/10462.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "pointsec-palmos-plaintext-pin(9021)",
|
||||
"refsource": "XF",
|
||||
"url": "http://www.iss.net/security_center/static/9021.php"
|
||||
},
|
||||
{
|
||||
"name": "20020507 KPMG-2002018: Pointsec for PalmOS PIN disclosure",
|
||||
"refsource": "BUGTRAQ",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "4681",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/4681"
|
||||
},
|
||||
{
|
||||
"name" : "pointsec-palmos-plaintext-pin(9021)",
|
||||
"refsource" : "XF",
|
||||
"url" : "http://www.iss.net/security_center/static/9021.php"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,29 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "20050415 Use of function \"log\" in Perl module Net::Server",
|
||||
"refsource" : "FULLDISC",
|
||||
"url" : "http://marc.info/?l=full-disclosure&m=111354538331167&w=2"
|
||||
},
|
||||
{
|
||||
"name" : "[postgrey] 20050414 Problem with crashing postgrey",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.ee.ethz.ch/postgrey/msg00627.html"
|
||||
},
|
||||
{
|
||||
"name" : "[postgrey] 20050414 Re: Problem with crashing postgrey",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.ee.ethz.ch/postgrey/msg00630.html"
|
||||
},
|
||||
{
|
||||
"name" : "[postgrey] 20050414 ANNOUNCE: Postgrey 1.21 (SECURITY)",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.ee.ethz.ch/postgrey/msg00647.html"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1121",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2006/dsa-1121"
|
||||
"name": "GLSA-200608-18",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://www.gentoo.org/security/en/glsa/glsa-200608-18.xml"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1122",
|
||||
@ -83,9 +63,64 @@
|
||||
"url": "http://www.debian.org/security/2006/dsa-1122"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200608-18",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200608-18.xml"
|
||||
"name": "21452",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21452"
|
||||
},
|
||||
{
|
||||
"name": "[postgrey] 20050414 Re: Problem with crashing postgrey",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.ee.ethz.ch/postgrey/msg00630.html"
|
||||
},
|
||||
{
|
||||
"name": "15517",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/15517"
|
||||
},
|
||||
{
|
||||
"name": "21164",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21164"
|
||||
},
|
||||
{
|
||||
"name": "20050415 Use of function \"log\" in Perl module Net::Server",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://marc.info/?l=full-disclosure&m=111354538331167&w=2"
|
||||
},
|
||||
{
|
||||
"name": "21152",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21152"
|
||||
},
|
||||
{
|
||||
"name": "[postgrey] 20050414 Problem with crashing postgrey",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.ee.ethz.ch/postgrey/msg00627.html"
|
||||
},
|
||||
{
|
||||
"name": "21149",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/21149"
|
||||
},
|
||||
{
|
||||
"name": "[postgrey] 20050414 ANNOUNCE: Postgrey 1.21 (SECURITY)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.ee.ethz.ch/postgrey/msg00647.html"
|
||||
},
|
||||
{
|
||||
"name": "postgrey-logging-dos(20108)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20108"
|
||||
},
|
||||
{
|
||||
"name": "DSA-1121",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2006/dsa-1121"
|
||||
},
|
||||
{
|
||||
"name": "14958",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14958"
|
||||
},
|
||||
{
|
||||
"name": "MDKSA-2006:131",
|
||||
@ -96,41 +131,6 @@
|
||||
"name": "13193",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13193"
|
||||
},
|
||||
{
|
||||
"name" : "15517",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/15517"
|
||||
},
|
||||
{
|
||||
"name" : "14958",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/14958"
|
||||
},
|
||||
{
|
||||
"name" : "21164",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21164"
|
||||
},
|
||||
{
|
||||
"name" : "21152",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21152"
|
||||
},
|
||||
{
|
||||
"name" : "21149",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21149"
|
||||
},
|
||||
{
|
||||
"name" : "21452",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/21452"
|
||||
},
|
||||
{
|
||||
"name" : "postgrey-logging-dos(20108)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/20108"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,16 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.red-database-security.com/wp/sql_injection_forms_us.pdf",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.red-database-security.com/wp/sql_injection_forms_us.pdf"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securiteam.com/securitynews/5HP0I0UFFI.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/securitynews/5HP0I0UFFI.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.red-database-security.com/wp/sql_injection_forms_us.pdf",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.red-database-security.com/wp/sql_injection_forms_us.pdf"
|
||||
},
|
||||
{
|
||||
"name": "oracle-forms-query-where-popup-sql-injection(20080)",
|
||||
"refsource": "XF",
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.s9y.org/63.html#A9",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.s9y.org/63.html#A9"
|
||||
},
|
||||
{
|
||||
"name": "15878",
|
||||
"refsource": "OSVDB",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "15145",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15145"
|
||||
},
|
||||
{
|
||||
"name": "http://www.s9y.org/63.html#A9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.s9y.org/63.html#A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -53,9 +53,9 @@
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.kb.cert.org/vuls/id/JGEI-6BCRCM",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/JGEI-6BCRCM"
|
||||
"name": "15421",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15421"
|
||||
},
|
||||
{
|
||||
"name": "VU#155610",
|
||||
@ -63,9 +63,9 @@
|
||||
"url": "http://www.kb.cert.org/vuls/id/155610"
|
||||
},
|
||||
{
|
||||
"name" : "15421",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/15421"
|
||||
"name": "http://www.kb.cert.org/vuls/id/JGEI-6BCRCM",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/JGEI-6BCRCM"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "7683",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/7683"
|
||||
},
|
||||
{
|
||||
"name": "33135",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33135"
|
||||
},
|
||||
{
|
||||
"name": "4894",
|
||||
"refsource": "SREASON",
|
||||
"url": "http://securityreason.com/securityalert/4894"
|
||||
},
|
||||
{
|
||||
"name": "33393",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33393"
|
||||
},
|
||||
{
|
||||
"name" : "4894",
|
||||
"refsource" : "SREASON",
|
||||
"url" : "http://securityreason.com/securityalert/4894"
|
||||
"name": "7683",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/7683"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,21 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118"
|
||||
},
|
||||
{
|
||||
"name": "33224",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/33224"
|
||||
},
|
||||
{
|
||||
"name": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119"
|
||||
},
|
||||
{
|
||||
"name": "20090113 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller 'bitmaps' Heap Overflow Vulnerability",
|
||||
"refsource": "IDEFENSE",
|
||||
@ -62,21 +77,6 @@
|
||||
"refsource": "IDEFENSE",
|
||||
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=764"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17118"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB17119"
|
||||
},
|
||||
{
|
||||
"name" : "33224",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/33224"
|
||||
},
|
||||
{
|
||||
"name": "33534",
|
||||
"refsource": "SECUNIA",
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2009-0213",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -58,14 +58,9 @@
|
||||
"url": "http://www.securityfocus.com/archive/1/500689/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.scada-security.com/vulnerabilities/areva1.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.scada-security.com/vulnerabilities/areva1.html"
|
||||
},
|
||||
{
|
||||
"name" : "VU#337569",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/337569"
|
||||
"name": "33837",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/33837"
|
||||
},
|
||||
{
|
||||
"name": "33637",
|
||||
@ -73,9 +68,14 @@
|
||||
"url": "http://www.securityfocus.com/bid/33637"
|
||||
},
|
||||
{
|
||||
"name" : "33837",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/33837"
|
||||
"name": "VU#337569",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/337569"
|
||||
},
|
||||
{
|
||||
"name": "http://www.scada-security.com/vulnerabilities/areva1.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.scada-security.com/vulnerabilities/areva1.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2012-0331",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-2329",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,40 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.php.net/ChangeLog-5.php#5.4.3",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/ChangeLog-5.php#5.4.3"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.php.net/archive/2012.php#id2012-05-08-1",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.php.net/archive/2012.php#id2012-05-08-1"
|
||||
},
|
||||
{
|
||||
"name": "https://bugs.php.net/bug.php?id=61807",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugs.php.net/bug.php?id=61807"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=820000",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=820000"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBMU02900",
|
||||
"refsource" : "HP",
|
||||
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT100992",
|
||||
"refsource" : "HP",
|
||||
"url" : "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
|
||||
},
|
||||
{
|
||||
"name" : "53455",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/53455"
|
||||
"name": "php-apacherequestheaders-bo(75545)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75545"
|
||||
},
|
||||
{
|
||||
"name": "49014",
|
||||
@ -93,9 +68,34 @@
|
||||
"url": "http://secunia.com/advisories/49014"
|
||||
},
|
||||
{
|
||||
"name" : "php-apacherequestheaders-bo(75545)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/75545"
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=820000",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=820000"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/archive/2012.php#id2012-05-08-1",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/archive/2012.php#id2012-05-08-1"
|
||||
},
|
||||
{
|
||||
"name": "53455",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/53455"
|
||||
},
|
||||
{
|
||||
"name": "SSRT100992",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
|
||||
},
|
||||
{
|
||||
"name": "HPSBMU02900",
|
||||
"refsource": "HP",
|
||||
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862"
|
||||
},
|
||||
{
|
||||
"name": "http://www.php.net/ChangeLog-5.php#5.4.3",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.php.net/ChangeLog-5.php#5.4.3"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-2381",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "psirt@cisco.com",
|
||||
"ID": "CVE-2012-3056",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert_us@oracle.com",
|
||||
"ID": "CVE-2012-3207",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "56062",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/56062"
|
||||
},
|
||||
{
|
||||
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "MDVSA-2013:150",
|
||||
"refsource": "MANDRIVA",
|
||||
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
||||
},
|
||||
{
|
||||
"name" : "56062",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/56062"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.mobileread.com/forums/showthread.php?s=c7953cc553a4aaa36e880b25aa1a6bf6&t=175368"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.kb.cert.org/vuls/id/MORO-8WKGBN",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/MORO-8WKGBN"
|
||||
},
|
||||
{
|
||||
"name": "VU#122656",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/122656"
|
||||
},
|
||||
{
|
||||
"name": "http://www.kb.cert.org/vuls/id/MORO-8WKGBN",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.kb.cert.org/vuls/id/MORO-8WKGBN"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.us-cert.gov/control_systems/pdf/ICSA-12-213-01.pdf"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.sielcosistemi.com/en/news/index.html?id=69",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://www.sielcosistemi.com/en/news/index.html?id=69"
|
||||
},
|
||||
{
|
||||
"name": "49395",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/49395"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sielcosistemi.com/en/news/index.html?id=69",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.sielcosistemi.com/en/news/index.html?id=69"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-4410",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-4455",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,11 +52,56 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "[oss-security] 20120909 Re: CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/09/2"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120924 Re: CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/25/5"
|
||||
},
|
||||
{
|
||||
"name": "50702",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/50702"
|
||||
},
|
||||
{
|
||||
"name": "55627",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/55627"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120927 Re: CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/27/2"
|
||||
},
|
||||
{
|
||||
"name": "opencryptoki-file-symlink(78943)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78943"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120920 Re: CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/20/6"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=730636",
|
||||
"refsource": "MISC",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=730636"
|
||||
},
|
||||
{
|
||||
"name": "[Opencryptoki-tech] 20120427 opencryptoki release 2.4.2",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://sourceforge.net/mailarchive/message.php?msg_id=29191022"
|
||||
},
|
||||
{
|
||||
"name": "http://opencryptoki.git.sourceforge.net/git/gitweb.cgi?p=opencryptoki/opencryptoki;a=commitdiff;h=5667edb52cd27b7e512f48f823b4bcc6b872ab15",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://opencryptoki.git.sourceforge.net/git/gitweb.cgi?p=opencryptoki/opencryptoki;a=commitdiff;h=5667edb52cd27b7e512f48f823b4bcc6b872ab15"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20120906 CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource": "MLIST",
|
||||
@ -66,51 +111,6 @@
|
||||
"name": "[oss-security] 20120907 Re: CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/09/07/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120909 Re: CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/09/09/2"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120920 Re: CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/09/20/6"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120924 Re: CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/09/25/5"
|
||||
},
|
||||
{
|
||||
"name" : "[oss-security] 20120927 Re: CVE request: opencryptoki insecure lock files handling",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://www.openwall.com/lists/oss-security/2012/09/27/2"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=730636",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=730636"
|
||||
},
|
||||
{
|
||||
"name" : "http://opencryptoki.git.sourceforge.net/git/gitweb.cgi?p=opencryptoki/opencryptoki;a=commitdiff;h=5667edb52cd27b7e512f48f823b4bcc6b872ab15",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "http://opencryptoki.git.sourceforge.net/git/gitweb.cgi?p=opencryptoki/opencryptoki;a=commitdiff;h=5667edb52cd27b7e512f48f823b4bcc6b872ab15"
|
||||
},
|
||||
{
|
||||
"name" : "55627",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/55627"
|
||||
},
|
||||
{
|
||||
"name" : "50702",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/50702"
|
||||
},
|
||||
{
|
||||
"name" : "opencryptoki-file-symlink(78943)",
|
||||
"refsource" : "XF",
|
||||
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/78943"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "secalert@redhat.com",
|
||||
"ID": "CVE-2012-4539",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,115 +52,115 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "[Xen-announce] 20121113 Xen Security Advisory 24 (CVE-2012-4539) - Grant table hypercall infinite loop DoS vulnerability",
|
||||
"refsource" : "MLIST",
|
||||
"url" : "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "[oss-security] 20121113 Xen Security Advisory 24 (CVE-2012-4539) - Grant table hypercall infinite loop DoS vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://www.openwall.com/lists/oss-security/2012/11/13/4"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-2582",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "http://www.debian.org/security/2012/dsa-2582"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201309-24",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://security.gentoo.org/glsa/glsa-201309-24.xml"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201604-03",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201604-03"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:1615",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:1486",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2012:1487",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:1572",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:1685",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name" : "SUSE-SU-2014:0446",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name" : "openSUSE-SU-2012:1573",
|
||||
"refsource" : "SUSE",
|
||||
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name" : "56498",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/56498"
|
||||
},
|
||||
{
|
||||
"name" : "87305",
|
||||
"refsource" : "OSVDB",
|
||||
"url" : "http://www.osvdb.org/87305"
|
||||
},
|
||||
{
|
||||
"name" : "1027763",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id?1027763"
|
||||
},
|
||||
{
|
||||
"name" : "51468",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51468"
|
||||
},
|
||||
{
|
||||
"name" : "51200",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51200"
|
||||
},
|
||||
{
|
||||
"name" : "51413",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51413"
|
||||
},
|
||||
{
|
||||
"name" : "51324",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51324"
|
||||
},
|
||||
{
|
||||
"name" : "51352",
|
||||
"refsource" : "SECUNIA",
|
||||
"url" : "http://secunia.com/advisories/51352"
|
||||
},
|
||||
{
|
||||
"name": "55082",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/55082"
|
||||
},
|
||||
{
|
||||
"name": "87305",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/87305"
|
||||
},
|
||||
{
|
||||
"name": "51413",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51413"
|
||||
},
|
||||
{
|
||||
"name": "51200",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51200"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201309-24",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-201309-24.xml"
|
||||
},
|
||||
{
|
||||
"name": "DSA-2582",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2012/dsa-2582"
|
||||
},
|
||||
{
|
||||
"name": "1027763",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id?1027763"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:1486",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:1685",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"
|
||||
},
|
||||
{
|
||||
"name": "xen-gnttabopgetstatus-dos(80026)",
|
||||
"refsource": "XF",
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80026"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:1572",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html"
|
||||
},
|
||||
{
|
||||
"name": "51468",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51468"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:1487",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html"
|
||||
},
|
||||
{
|
||||
"name": "[Xen-announce] 20121113 Xen Security Advisory 24 (CVE-2012-4539) - Grant table hypercall infinite loop DoS vulnerability",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2014:0446",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
||||
},
|
||||
{
|
||||
"name": "51352",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51352"
|
||||
},
|
||||
{
|
||||
"name": "51324",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/51324"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201604-03",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201604-03"
|
||||
},
|
||||
{
|
||||
"name": "56498",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/56498"
|
||||
},
|
||||
{
|
||||
"name": "SUSE-SU-2012:1615",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "openSUSE-SU-2012:1573",
|
||||
"refsource": "SUSE",
|
||||
"url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "cert@cert.org",
|
||||
"ID": "CVE-2012-4940",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "VU#586556",
|
||||
"refsource" : "CERT-VN",
|
||||
"url" : "http://www.kb.cert.org/vuls/id/586556"
|
||||
},
|
||||
{
|
||||
"name": "56343",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/56343"
|
||||
},
|
||||
{
|
||||
"name": "VU#586556",
|
||||
"refsource": "CERT-VN",
|
||||
"url": "http://www.kb.cert.org/vuls/id/586556"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2012-6283",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
||||
"ID": "CVE-2012-6435",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
|
@ -1,12 +1,12 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "cve@mitre.org",
|
||||
"ID": "CVE-2017-2023",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "REJECT"
|
||||
},
|
||||
"data_format" : "MITRE",
|
||||
"data_type" : "CVE",
|
||||
"data_version" : "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
|
@ -53,6 +53,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "99942",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99942"
|
||||
},
|
||||
{
|
||||
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0338",
|
||||
"refsource": "MISC",
|
||||
@ -62,11 +67,6 @@
|
||||
"name": "DSA-3923",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2017/dsa-3923"
|
||||
},
|
||||
{
|
||||
"name" : "99942",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/99942"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,16 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-17-030",
|
||||
"refsource" : "MISC",
|
||||
"url" : "http://www.zerodayinitiative.com/advisories/ZDI-17-030"
|
||||
},
|
||||
{
|
||||
"name" : "https://helpx.adobe.com/security/products/acrobat/apsb17-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://helpx.adobe.com/security/products/acrobat/apsb17-01.html"
|
||||
},
|
||||
{
|
||||
"name": "95344",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +61,16 @@
|
||||
"name": "1037574",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1037574"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zerodayinitiative.com/advisories/ZDI-17-030",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.zerodayinitiative.com/advisories/ZDI-17-030"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb17-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://helpx.adobe.com/security/products/acrobat/apsb17-01.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "99345",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/99345"
|
||||
},
|
||||
{
|
||||
"name": "43450",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
@ -62,20 +67,15 @@
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/artkond/cisco-snmp-rce"
|
||||
},
|
||||
{
|
||||
"name" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp"
|
||||
},
|
||||
{
|
||||
"name" : "99345",
|
||||
"refsource" : "BID",
|
||||
"url" : "http://www.securityfocus.com/bid/99345"
|
||||
},
|
||||
{
|
||||
"name": "1038808",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1038808"
|
||||
},
|
||||
{
|
||||
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/radare/radare2/commit/bd1bab05083d80464fea854bf4b5c49aaf1b8401",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/radare/radare2/commit/bd1bab05083d80464fea854bf4b5c49aaf1b8401"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/radare/radare2/issues/10465",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/radare/radare2/issues/10465"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/radare/radare2/commit/bd1bab05083d80464fea854bf4b5c49aaf1b8401",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/radare/radare2/commit/bd1bab05083d80464fea854bf4b5c49aaf1b8401"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://github.com/fouzhe/security/tree/master/pngwriter",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://github.com/fouzhe/security/tree/master/pngwriter"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/pngwriter/pngwriter/issues/129",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/pngwriter/pngwriter/issues/129"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/fouzhe/security/tree/master/pngwriter",
|
||||
"refsource": "MISC",
|
||||
"url": "https://github.com/fouzhe/security/tree/master/pngwriter"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,95 +52,95 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "45697",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45697/"
|
||||
},
|
||||
{
|
||||
"name": "45742",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45742/"
|
||||
},
|
||||
{
|
||||
"name" : "45832",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45832/"
|
||||
},
|
||||
{
|
||||
"name" : "45908",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45908/"
|
||||
},
|
||||
{
|
||||
"name" : "45922",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45922/"
|
||||
},
|
||||
{
|
||||
"name" : "45938",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/45938/"
|
||||
},
|
||||
{
|
||||
"name" : "46142",
|
||||
"refsource" : "EXPLOIT-DB",
|
||||
"url" : "https://www.exploit-db.com/exploits/46142/"
|
||||
},
|
||||
{
|
||||
"name": "[xorg-announce] 20181025 X.Org security advisory: October 25, 2018",
|
||||
"refsource": "MLIST",
|
||||
"url": "https://lists.x.org/archives/xorg-announce/2018-October/002927.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html",
|
||||
"refsource" : "MISC",
|
||||
"url" : "https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665"
|
||||
},
|
||||
{
|
||||
"name" : "https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170"
|
||||
},
|
||||
{
|
||||
"name" : "https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-4328",
|
||||
"refsource" : "DEBIAN",
|
||||
"url" : "https://www.debian.org/security/2018/dsa-4328"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-201810-09",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "https://security.gentoo.org/glsa/201810-09"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2018:3410",
|
||||
"refsource" : "REDHAT",
|
||||
"url" : "https://access.redhat.com/errata/RHSA-2018:3410"
|
||||
"name": "45922",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45922/"
|
||||
},
|
||||
{
|
||||
"name": "USN-3802-1",
|
||||
"refsource": "UBUNTU",
|
||||
"url": "https://usn.ubuntu.com/3802-1/"
|
||||
},
|
||||
{
|
||||
"name": "https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://gitlab.freedesktop.org/xorg/xserver/commit/50c0cf885a6e91c0ea71fb49fa8f1b7c86fe330e"
|
||||
},
|
||||
{
|
||||
"name": "45697",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45697/"
|
||||
},
|
||||
{
|
||||
"name": "RHSA-2018:3410",
|
||||
"refsource": "REDHAT",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2018:3410"
|
||||
},
|
||||
{
|
||||
"name": "105741",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105741"
|
||||
},
|
||||
{
|
||||
"name": "45908",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45908/"
|
||||
},
|
||||
{
|
||||
"name": "https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html",
|
||||
"refsource": "MISC",
|
||||
"url": "https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html"
|
||||
},
|
||||
{
|
||||
"name": "46142",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/46142/"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-201810-09",
|
||||
"refsource": "GENTOO",
|
||||
"url": "https://security.gentoo.org/glsa/201810-09"
|
||||
},
|
||||
{
|
||||
"name": "1041948",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041948"
|
||||
},
|
||||
{
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14665"
|
||||
},
|
||||
{
|
||||
"name": "45832",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45832/"
|
||||
},
|
||||
{
|
||||
"name": "https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://gitlab.freedesktop.org/xorg/xserver/commit/8a59e3b7dbb30532a7c3769c555e00d7c4301170"
|
||||
},
|
||||
{
|
||||
"name": "45938",
|
||||
"refsource": "EXPLOIT-DB",
|
||||
"url": "https://www.exploit-db.com/exploits/45938/"
|
||||
},
|
||||
{
|
||||
"name": "DSA-4328",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "https://www.debian.org/security/2018/dsa-4328"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "1041809",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://www.securitytracker.com/id/1041809"
|
||||
},
|
||||
{
|
||||
"name": "https://helpx.adobe.com/security/products/acrobat/apsb18-30.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "105432",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/105432"
|
||||
},
|
||||
{
|
||||
"name" : "1041809",
|
||||
"refsource" : "SECTRACK",
|
||||
"url" : "http://www.securitytracker.com/id/1041809"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -58,9 +58,9 @@
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652633"
|
||||
},
|
||||
{
|
||||
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1652635",
|
||||
"name": "https://github.com/hfp/libxsmm/issues/287",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1652635"
|
||||
"url": "https://github.com/hfp/libxsmm/issues/287"
|
||||
},
|
||||
{
|
||||
"name": "https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d",
|
||||
@ -68,9 +68,9 @@
|
||||
"url": "https://github.com/hfp/libxsmm/commit/151481489192e6d1997f8bde52c5c425ea41741d"
|
||||
},
|
||||
{
|
||||
"name" : "https://github.com/hfp/libxsmm/issues/287",
|
||||
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1652635",
|
||||
"refsource": "MISC",
|
||||
"url" : "https://github.com/hfp/libxsmm/issues/287"
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1652635"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER" : "security@google.com",
|
||||
"ASSIGNER": "security@android.com",
|
||||
"DATE_PUBLIC": "2019-01-01T00:00:00",
|
||||
"ID": "CVE-2018-9589",
|
||||
"STATE": "PUBLIC"
|
||||
@ -53,15 +53,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name" : "https://source.android.com/security/bulletin/2019-01-01.html",
|
||||
"refsource" : "CONFIRM",
|
||||
"url" : "https://source.android.com/security/bulletin/2019-01-01.html"
|
||||
},
|
||||
{
|
||||
"name": "106495",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/106495"
|
||||
},
|
||||
{
|
||||
"name": "https://source.android.com/security/bulletin/2019-01-01.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "https://source.android.com/security/bulletin/2019-01-01.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user